acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorThe New York Times
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Your Digital Trail Follows You to the Border
From ACM News

Your Digital Trail Follows You to the Border

Information, money and jobs flow easily around the world, yet it’s getting tougher for travelers to cross some borders.

Justices Appear Divided on Cellphone Warrants
From ACM News

Justices Appear Divided on Cellphone Warrants

The Supreme Court on Tuesday seemed torn as it considered a pair of cases about whether the police need warrants to search the cellphones of people they arrest.

Few Consumers Are Buying Premise of Mobile Wallets
From ACM News

Few Consumers Are Buying Premise of Mobile Wallets

Millions of Americans use smartphones for tasks like hailing a taxi or checking in for a flight. But for buying something in a store?

Snowden Retained Expert in Espionage Act Defense
From ACM News

Snowden Retained Expert in Espionage Act Defense

Edward J. Snowden, the former National Security Agency contractor who provided journalists a trove of classified documents, retained a well-known Washington defense...

Russia Displays a New Military Prowess in ­kraine's East
From ACM News

Russia Displays a New Military Prowess in ­kraine's East

Secretary of State John Kerry has accused Russia of behaving in a "19th-century fashion" because of its annexation of Crimea.

U.s. Promotes Network to Foil Digital Spying
From ACM TechNews

U.s. Promotes Network to Foil Digital Spying

A group of academics and computer enthusiasts have used the Tunisian town of Sayada as a test site for a local network that is physically independent from the Internet...

Hackers Lurking in Vents and Soda Machines
From ACM TechNews

Hackers Lurking in Vents and Soda Machines

Hackers are exploiting overlooked vulnerabilities in third-party access points ranging from online restaurant menus to soda machines to heating and cooling systems...

Hackers Lurking in Vents and Soda Machines
From ACM News

Hackers Lurking in Vents and Soda Machines

They came in through the Chinese takeout menu.

Search For Lost Jet Is Complicated By Geopolitics and Rivalries
From ACM News

Search For Lost Jet Is Complicated By Geopolitics and Rivalries

The frantic hunt for Malaysia Airlines Flight 370 has been, in one way, a nearly miraculous display of international collaboration: 26 nations, many of them rivals...

Consortium Wants Standards For 'internet of Things'
From ACM News

Consortium Wants Standards For 'internet of Things'

Attention: Internet of Things. For better or worse, big boys are in the room.

N.S.A. Breached Chinese Servers Seen as Security Threat
From ACM News

N.S.A. Breached Chinese Servers Seen as Security Threat

American officials have long considered Huawei, the Chinese telecommunications giant, a security threat, blocking it from business deals in the United States for...

Revelations of N.s.a. Spying Cost ­.s. Tech Companies
From ACM News

Revelations of N.s.a. Spying Cost ­.s. Tech Companies

Microsoft has lost customers, including the government of Brazil.

N.s.a. Director Says Snowden Leaks Hamper Efforts Against Cyberattacks
From ACM News

N.s.a. Director Says Snowden Leaks Hamper Efforts Against Cyberattacks

Gen. Keith B. Alexander, the director of the National Security Agency, said Tuesday that the leaks by the former agency contractor Edward J. Snowden had slowed...

Report Calls for Better Backstops to Protect Power Grid From Cyberattacks
From ACM TechNews

Report Calls for Better Backstops to Protect Power Grid From Cyberattacks

Despite increasing anxiety over the possibility of a cyberattack on the power grid, the U.S. energy industry and government are ill-equipped to counter the threat...

Syria War Stirs New ­.S. Debate on Cyberattacks
From ACM News

Syria War Stirs New ­.S. Debate on Cyberattacks

Not long after the uprising in Syria turned bloody late in the spring of 2011, the Pentagon and theNational Security Agency developed a battle plan that featured...

At Newark Airport, the Lights Are On, and They're Watching You
From ACM News

At Newark Airport, the Lights Are On, and They're Watching You

Visitors to Terminal B at Newark Liberty International Airport may notice the bright, clean lighting that now blankets the cavernous interior, courtesy of 171 recently...

Snowden ­sed Low-Cost Tool to Best NSA
From ACM TechNews

Snowden ­sed Low-Cost Tool to Best NSA

Edward Snowden used inexpensive and widely available software to "scrape" the U.S. National Security Agency's (NSA) networks, according to intelligence officials...

When No One Is Just a Face in the Crowd
From ACM News

When No One Is Just a Face in the Crowd

Hey, big spenders.

Another Super Bowl Ad Fest, This Time on the Cellphone
From ACM News

Another Super Bowl Ad Fest, This Time on the Cellphone

Want to see the Vince Lombardi Trophy that goes to the Super Bowl winner? Take a left in 15 feet.

N.s.a. Choice Is Navy Expert on Cyberwar
From ACM News

N.s.a. Choice Is Navy Expert on Cyberwar

In nominating Vice Adm. Michael S. Rogers as the new director of the National Security Agency on Thursday, President Obama chose a recognized expert in the new...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account